Mostrando 2 resultados de: 2
Filtros aplicados
Subtipo de publicación
Article(2)
An efficient detection and management of false accusation attacks in hierarchical ad-hoc networks
ArticleAbstract: An approach to detect abnormal activities based on reputations created individually by each node isPalabras claves:Ad-hoc network, False accusation, intrusion detection, ReputationAutores:Lee S., Lee Y., Sang Guun YooFuentes:googlescopusEnhanced intrusion detection system for PKMv2 EAP-AKA used in WiBro
ArticleAbstract: WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is an emePalabras claves:authentication, Denial of Service, EAP-AKA, intrusion detection, Network security, WiBroAutores:Kim J., Lee S., Lee Y., Sang Guun Yoo, Yang Y.K.Fuentes:googlescopus